CROSS REFERENCE TO RELATED APPLICATIONSThis application claims the benefit of priority under 35 U.S.C. §119(e) of U.S. Provisional Patent Application No. 61/525,722, filed Aug. 19, 2011, the entire content of which is incorporated herein by reference.
TECHNICAL FIELDThe present disclosure relates generally to contactless devices and more particularly to methods and systems that allow for point of sale processing and communication of multiple user options initiated by a single initiation of a communication channel.
BACKGROUNDNear Field Communication (NFC) is a proximity communication technology that can enable contactless device payment technologies and that is supported by the Global System for Mobile Communications (GSM) Association. Radio frequency identification (RFID) is another wireless communication technology that can be adapted to enable NFC contactless device payment technology. NFC communication generally is conducted in a range from about 3 to about 4 inches. Such short communication distances limit enable secure communication between close field proximity enabled devices. In operation of an NFC transaction, a user “taps” a contactless device, such as an NFC-enabled mobile phone, to a reader of a point of sale system. The reader recognizes the NFC-enabled device when the device is moved within range of the reader, establishes a secure communication channel with the device, and initiates a payment transaction between the reader and the device. The duration of the transaction is very short and does not easily permit communication of other information or conducting of other services during the transaction. Additionally, the device must be held close to the reader during the entire NFC transaction. NFC contactless payment devices can function as a credit card to enable purchases at the point-of-sale.
NFC contactless payment devices can function as a credit card to enable purchases at the point-of-sale. However, the short duration of conventional methods and systems for contactless payment devices do not enable the utilization of value-added services and user choices. During the conventional transaction, the device and the reader communicate to complete the predefined transaction. Further user input or further transactions, such as user selection of coupons or loyalty rewards or automatic application of those items, is not possible in the predefined NFC transaction. Alternative conventional methods require multiple taps or a tap and hold of the contactless device to enable the utilization of each service, resulting in user inconvenience.
SUMMARYIn certain exemplary aspects, a method of allowing point of sale processing and communication of multiple user options with a single initiation of a contactless transaction comprises a device reader that facilitates a secure and convenient connection with a contactless device. The user taps the contactless device in the device reader's radio frequency field. The device reader and the contactless device establish a secure communication channel. Once a secure communication channel is established, the device reader communicates the purchase to the contactless device. The contactless device begins communication options to the user and confirms value-added services available via a user interface on the device. The contactless device communicates the user's selected value-added service to the device reader and the reader communicates the purchase price of the transaction. The contactless device communicates payment options to the user via the user interface and then communicates the user-selected payment options to the device reader. The contactless device can confirm valid PIN entry before the transaction is authorized. The device reader communicates a digital receipt to the contactless device, and the secure communication is terminated.
These and other aspects, objects, features, and advantages of the exemplary embodiments will become apparent to those having ordinary skill in the art upon consideration of the following detailed description of illustrated exemplary embodiments, which include the best mode of carrying out the invention as presently presented.
BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1 is a block diagram depicting a system for a point of sale process and communication of multiple user options initiated by a single tap of a contactless device with a point of sale reader device according to an exemplary embodiment.
FIG. 2 is a block flow diagram depicting a method for processing a point of sale transaction and multiple user options initiated by a single tap of a contactless device with a point of sale reader device according to an exemplary embodiment.
FIG. 3 is a block flow diagram depicting a method for establishing a secure communication channel between the device reader and the contactless device according to an exemplary embodiment.
FIG. 4 is a block flow diagram depicting a method for initiating value-added services for the purchase transaction according to an exemplary embodiment.
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTSOverview
The exemplary embodiments provide methods and systems that enable users to utilize point of sale processing and communication of multiple user options with a single tap of a contactless device. The user taps the contactless device in the device reader's radio frequency field. The device reader detects the contactless device and establishes a timing protocol for the communication. The device reader requests communication with the contactless device and establishes a number of protocols to enable a secure communication channel. The contactless device accepts the request, and the reader and device establish a secure communication channel via Bluetooth, Wi Fi, or other communication channel suitable for persistent communication via short range. The communication channel allows communication with the reader from outside of the reader's NFC field of communication.
Once a secure communication channel is established, the device reader communicates purchase transaction details to the contactless device, and the contactless device communicates the transaction details to the user via a user interface on the device. The contactless device then determines whether a value-added service is available for the purchase, including, but not limited to, coupons, loyalty cards, check-ins, membership cards, and other forms of non-payment services. The contactless device communicates the value-added service options to the user via the user interface, and the user selects one or more options. The contactless device then communicates the selected option(s) to the device reader. The selection of value-added service options may repeat until there additional value-added service options are not available or are not selected.
The point of sale system applies all user selected options and determines the purchase price of the transaction. The reader communicates the price to the contactless device. The contactless device determines whether a payment-option is available for the purchase, such as gift cards, credit cards, debit cards, prepaid cards, and split-tender transactions (for example, the user can pay x amount of dollars on a gift card and the remainder on another form of payment). The contactless device communicates the payment options to the user via the user interface on the device, and the user selects one or more options. The contactless device then requests personal identification number (PIN) authorization from the user via the user interface on the device. The user enters the PIN authorization via the user interface, and a secure element on the device confirms a valid entry. The contactless device communicates the payment information to the device reader, and the device reader completes the payment and communicates a digital receipt to the contactless device. The secure communication channel is then terminated.
One or more aspects of the invention may comprise a computer program that embodies the functions described and illustrated herein, wherein the computer program is implemented in a computer system that comprises instructions stored in a machine-readable medium and a processor that executes the instructions. However, it should be apparent that there could be many different ways of implementing the invention in computer programming, and the invention should not be construed as limited to any one set of computer program instructions. Further, a skilled programmer would be able to write such a computer program to implement an embodiment of the disclosed invention based on the appended flow charts and associated description in the application text. Therefore, disclosure of a particular set of program code instructions is not considered necessary for an adequate understanding of how to make and use the invention. Further, those skilled in the art will appreciate that one or more aspects of the invention described herein may be performed by hardware, software, or a combination thereof, as may be embodied in one or more computing systems. Moreover, any reference to an act being performed by a computer should not be construed as being performed by a single computer as the act may be performed by more than one computer. The inventive functionality of the invention will be explained in more detail in the following description, read in conjunction with the figures illustrating the program flow.
Turning now to the drawings, in which like numerals indicate like (but not necessarily identical) elements throughout the figures and exemplary embodiments are described in detail.
System Architecture
FIG. 1 is a block diagram depicting asystem100 for a point of sale process and communication of multiple user options initiated by a single tap of acontactless device120 with a point ofsale reader115 according to an exemplary embodiment. As depicted inFIG. 1, theexemplary operating environment100 includes a merchant point of sale (POS)terminal system110 and acontactless device system120 that are configured to communicate with one another via one or moresecure communication channels130.
Thesecure communication channel130 includes a telecommunication means by which network devices (includingdevices110 and120) can exchange data. For example, each connection can include a local area network (LAN), a wide area network (WAN), an intranet, an Internet, a mobile telephone network, a personal area network (PAN) or any combination thereof. Throughout this specification, it should be understood that the terms “data” and “information” are used interchangeably herein to refer to text, images, audio, video, or any other form of information that can exist in a computer-based environment. In exemplary embodiments, the secure communication channel comprises a proximity communication connection, such as Bluetooth. Bluetooth can enable the exchange of data over short distances through the creation of PANs with high levels of security. Wi-Fi is yet another proximity communication type wherein contactless devices can communicate via a wireless ad hoc network.
ThePOS terminal system110 includes adevice reader115 that is capable of communicating with thecontactless device system120 and themerchant POS terminal110 via anapplication118. In an exemplary embodiment thedevice reader115 communicates with thecontactless device120 using a Bluetooth communication method. In another exemplary embodiment, thedevice reader115 communicates with thecontactless device120 using a Wi-Fi communication method. In yet another embodiment, thedevice reader115 communicates with thecontactless device120 using a near field communication (NFC) communication method. While thedevice reader115 is depicted as an integrated part of thePOS terminal110, thedevice reader115 may also be a standalone hardware device, in accordance with alternative exemplary embodiments.
In an exemplary embodiment, thecontactless device system120 can refer to a smart device that can communicate via an electronic, magnetic, or radio frequency field between the device and another device, such as aterminal reader115. In an exemplary embodiment, thecontactless device120 has processing capabilities, such as storage capacity/memory and one ormore application122 that can perform a particular function. In an exemplary embodiment, thecontactless device120 contains an operating system (not illustrated) and user interface123. Exemplarycontactless devices120 include smart phones; mobile phones; PDAs; mobile computing devices, such as netbooks and iPads; other electronically enabled key fobs; electronically enabled credit card type cards; and other devices, in each case having processing and user interface functionality. Certaincontactless devices120 can be used for multiple purposes, including financial transactions, coupons, ticketing, secure authentication, and other related applications.
The secure element can exist within a removable smart chip or a secure digital (SD) card, or can be embedded within a fixed chip on thedevice120. In certain exemplary embodiments, Subscribed Identity Module (SIM) cards may be capable of hosting asecure element126, for example, an NFC SIM Card. The secure element allows a wallet software application orother application122 resident on thedevice120 and accessible by the device user to interact securely with certain functions within the secure element, while protecting information stored within the secure element. Thesecure element126 comprisesapplications127 running thereon that perform the functionality described herein.
Thesecure element126 includes components typical of a smart card such as crypto processors and random generators. In an exemplary embodiment, thesecure element126 comprises a Smart MXtype NFC controller124 in a highly secure system on a chip controlled by a smart card operating system, such as a JavaCard Open Platform (JCOP) operating system. In another exemplary embodiment, thesecure element126 is configured to include a non-EMV type contactless smart card, such as an optional implementation.
Thesecure element126 communicates with thecontroller124 and theapplication122 in thecontactless device120. In an exemplary embodiment, thesecure element126 is capable of storing encrypted user information and only allowing trusted applications to access the stored information. Thecontroller124 interacts with a secure keyencrypted application122 for decryption and installation in thesecure element126. In an exemplary embodiment, thecontroller124 is a Bluetooth link controller. The Bluetooth link controller may be capable of sending and receiving data, identifying thedevice reader115, performing authentication and ciphering functions, and directing how thecontactless device120 will listen for transmissions from thedevice reader115 or configure thecontactless device120 into various power-save modes according to the Bluetooth-specified procedures. In another exemplary embodiment, thecontroller124 is a Wi-Fi controller or an NFC controller capable of performing similar functions.
Theapplication122 is a program, function, routine, applet or similar entity that exists on and performs its operations on acontactless device120. For example, theapplication122 may be one or more of a digital wallet application, a coupon application, a loyalty card application, another value-added application, a user interface application, or other suitable application operating on thecontactless device120. Additionally, thesecure element126 also may comprise secure contactless software applications, such as payment applications, secure forms of theapplications122, authentication applications, payment provisioning applications, or other suitable application using the secure functionality of the secure element.
Thecontactless device120 communicates with thereader115 via anantenna128. In an exemplary embodiment, once thecontactless device application122 has been activated and prioritized, thecontroller124 is notified of the state of readiness of thecontactless device120 for a transaction. Thecontroller124 outputs through the antenna128 a radio signal, or listens for radio signals from thedevice reader115. On establishing a secure communication channel between thecontactless device120 and thedevice reader115, thedevice reader115 requests the list ofavailable applications127 from thesecure element126. A directory is first displayed, after which, based on the set priority or the type ofdevice reader115, anapplication127 is chosen and initiated for the transaction. The method for processing a point of sale transaction and communication of multiple user options initiated by a single tap is described in more detail hereinafter with reference to the methods described inFIGS. 2-4.
System Process
FIG. 2 is a block flow diagram depicting a method for processing a point of sale transaction and multiple user options initiated by a single tap of a contactless device with a POS reader according to an exemplary embodiment. Themethod200 is described with reference to the components illustrated inFIG. 1.
Inblock210, the user “taps” thecontactless device120 in the proximity of thedevice reader115. In an exemplary embodiment, thedevice reader115 generates a radio frequency (RF) or other field continuously polling for the presence of acontactless device120, and the user “taps” the contactless device by placing thedevice120 within the field of thereader115. In an alternative exemplary embodiment, thecontactless device120 generates a radio frequency (RF) or other field continuously polling for the presence of adevice reader115, and the user “taps” the contactless device by placing thedevice120 in proximity of thereader115.
Thedevice reader115 detects thecontactless device120 and establishes a secure communication channel inblock220. In an alternative exemplary embodiment, thecontactless device120 detects thedevice reader115 and establishes a secure communication channel. The method for establishing a secure communication channel is described in more detail hereinafter with reference to the methods described inFIG. 3.
FIG. 3 is a block flow diagram depicting a method for establishing a secure communication channel between thedevice reader115 and thecontactless device120 according to an exemplary embodiment. Themethod220 is described with reference to the components illustrated inFIG. 1.
After the user taps thecontactless device120 in the proximity of thedevice reader115, thedevice reader115 detects the physical proximity of thecontactless device120 inblock310. In an exemplary embodiment, the detection of the physical proximity of thecontactless device120 ensures that thedevice reader115 is communicating with only one contactless device and that the contactless device is physically present within the field of thereader110. In an exemplary embodiment, thereader115 and thedevice120 may initially interact via NFC protocols whereby the reader detects the presence of thedevice120 and requests communication therewith. In an alternative exemplary embodiment, thecontactless device120 detects the physical proximity of thedevice reader115.
Inblock320, thedevice reader115 initiates a timing protocol with thecontactless device120. In an alternative exemplary embodiment, thecontactless device120 initiates a timing protocol with thedevice reader115. The timing protocol specifies a time period within which communications between thereader115 and thedevice120 must occur to indicate that thedevice120 is physically present at thereader115. In an exemplary embodiment, the detection of physical proximity provides a security measure. The initiation of the timing protocol is used to ensure communication with thecontactless device120 is not done through a proxy device, wherein the information contained on thecontactless device120 was copied onto a proxy device in an effort to masquerade and commit a fraudulent act. The timing protocol ensures communication with a single device and detects additional time that would be required to communicate through a proxy device, thereby determining whether thedevice120 is physically present at thereader115. In another exemplary embodiment, the timing protocol can establish a period of inactivity that will terminate the communication between thecontactless device120 and thedevice reader115 once a secure communication channel is established. After determining that thereader115 is communicating with a physicallypresent device120, themethod220 proceeds to block330. If thereader115 determines inblock320 that thedevice120 is not physically present, then the method220 (and thus the method200) terminates.
The information communicated during the initial NFC communication channel depends on the type of secure protocol being used with the secondary communication channel. In an exemplary embodiment, thecontactless device120 and thedevice reader115 may have a pre-existing relation established. The initial NFC communication channel initiates the communication between the devices (115 and120) by providing a prompt to switch to a different secondary communication channel. In an alternative exemplary embodiment, the devices (115 and120) exchange a key during the initial NFC communication to set up a secondary secure communication channel.
Inblock330, thedevice reader115 requests a secure communication channel with thecontactless device120. In an exemplary embodiment, thedevice reader115 and thecontactless device120 can establish any number of protocols to enable a secure communication channel, including but not limited to Bluetooth protocols such as a link management protocol (LMP), logical link control and adaptation protocol (L2CAP), and service discovery protocol (SDP). In an exemplary embodiment, Bluetooth pairing of the reader114 and thedevice120 can occur automatically by such communication. In another exemplary embodiment, thecontactless device120 may present the user with an interface requesting authorization to successfully pair thecontactless device120 and thedevice reader115 to enable a Bluetooth communication. Such Bluetooth communications include secure communication functionality. In an alternative exemplary embodiment, thecontactless device120 requests a secure communication channel with thedevice reader115.
In another exemplary embodiment, the reader may present a Wi-Fi connection to which thedevice120 can connect, which connection can occur automatically or via user authorization as described previously with regard to the Bluetooth embodiment. A Wi-Fi connection can comprise secure communication functionality, such as cryptographic protocols, including transport layer security or secure socket layer protocols, or other secure communication methodology.
Inblock340, thecontactless device120 accepts the secure communication channel request from thedevice reader115, and a secure communication channel is established inblock350. In an alternative exemplary embodiment, thedevice reader115 accepts the secure communication channel request from thecontactless device120. During this process, thedevice120 and thereader115 may establish a relationship by creating an encryption key for use in encrypting communications there between.
As described previously, the secure communication can be established in exemplary embodiments via Bluetooth or Wi-Fi. Such secure communications can provide benefits over an NFC type connection. For example, such secure communications can remain open for ranges farther than the limited 3-4 inch range of NFC communications. Additionally, such secure communications can remain open for longer time periods, for example, until terminated by thereader115, thedevice120, or by user input into thedevice120. In certain exemplary embodiments, the original NFC communication channel and the secondary Bluetooth or Wi-Fi communication channels can co-exist for a period of time (for example, the NFC communication channel may be used to boost a higher bandwidth for the secondary communication channel or authentication may be completed using the original NFC communication channel while establishing the secondary communication channel).
Fromblock350, themethod220 proceeds to block230 (FIG. 2).
Returning toFIG. 2, inblock230, thedevice reader115 communicates purchase information to thecontactless device120 through thesecure communication channel130 established inblock220. In an exemplary embodiment, thedevice reader115 communicates a list of items or services purchased. In another exemplary embodiment, thedevice reader115 also communicates the preliminary total of the purchase to thecontactless device120. The purchase information also can comprise merchant name, payment forms accepted, merchant loyalty rewards program identification, merchant location, or other suitable purchase information related to the transaction being conducted at the point ofsale system110.
Thecontactless device120 receives the purchase information from thedevice reader115 and initiates value-added services for the purchase transaction inblock240. Themethod240 for initiating value-added services for the purchase transaction is described in more detail hereinafter with reference to the methods described inFIG. 4.
FIG. 4 is a block flow diagram depicting amethod240 for initiating value-added services for the purchase transaction according to an exemplary embodiment. Themethod240 is described with reference to the components illustrated inFIG. 1.
After thecontactless device120 receives the purchase information from thedevice reader115, thecontactless device120 communicates thepurchase information130 to the user in block410, via a user interface123 of thedevice120. In an exemplary embodiment, thecontactless device120 communicates the purchase information received from thedevice reader115 inblock230 and initiates an interaction with the user to present value-added service options, or other options, available for selection. In an exemplary embodiment, theapplication122 is engaged and processes the purchase information received from thedevice reader115 to present the purchase information via the user interface123. Theapplication122 may create a list of options available to the user based on the purchase information and the information stored in theapplication122. In another exemplary embodiment, theapplication122 creates a series of prompts requesting user choices for the available options.
At block420, thecontactless device120 determines whether a value-added service is available for the purchase, including, but not limited to, coupons, loyalty cards, check-ins, membership cards, ticketing, and other forms of value-added services. In an exemplary embodiment, thecontactless device120 reviews the list of options and determines if any value-added service options are available. For example, theapplication122 can store various value-added services. Alternatively or additionally, thesecure element126 may store various value-added services or the confidential information relating to such value added services. Theapplication122 can review the list of available value added services of theapplication122 and thesecure element126 to identify any value-added services for the purchase transaction. As an example, the user may have stored a coupon for the merchant or the product being purchased in thedevice120. Theapplication122 will identify the coupon for the purchase transaction. As another example, the application can identify loyalty points collected by the user for this merchant, determine if the loyalty points can be redeemed in the purchase transaction, and, if so, identify the loyalty points for the purchase transaction.
If thecontactless device120 determines in block410, that value-added service options are available, thecontactless device120 communicates one or more value-added service option to the user in block425 via the user interface123. In an exemplary embodiment, thecontactless device120 creates a priority list of value-added service options and communicates the first service option to the user. In another exemplary embodiment, the user pre-selects an order of the value-added service options using theapplication122 when registering and/or configuring theapplication122. Additionally, multiple value-added service options may be presented for selection by the user. In an exemplary embodiment, the value-added service options are present in the form of a pop-up prompt or window on thecontactless device120. In another exemplary embodiment, theapplication122 is automatically opened and the options are displayed on thecontactless device120.
In block430, the user selects a value-added service option. In an exemplary embodiment, the user interacts with the touch-screen of a smart phone to select a value-added service option. In another exemplary embodiment, the user may select the button that corresponds to the selected value-added service option.
Thecontactless device120 communicates the selected value-added service option to the device reader in block440. In an exemplary embodiment, the communication is through thesecure communication channel130 established between thecontactless device120 and thedevice reader115.
Thecontactless device120 then repeats this process in block445, determining whether another value-added service option is available for the use at block420, communicating the value-added service options to the user in block430, receiving the user's selected option in block440 and communicating the selected option to thedevice reader115 in block440. The process is repeated at least one time until there additional value-added service options are not available or are not selected. In another exemplary embodiment, all the value-added services are presented to the user at one time, and the user can select all desired value added services without repeating the process.
Once all the value-added service options have been presented and selected by the user, thecontactless device120 communicates to thedevice reader115 in block440 that additional value-added services will not be used.
Thedevice reader115 processes the selected value-added service options, calculates the total of the purchase transaction, and communicates the total to thecontactless device120 in block450. In an exemplary embodiment, thedevice reader115 applies any coupons, loyalty rewards, membership card information, other discounts, or other transaction actions and adjusts the purchase price accordingly. Although described throughout this specification as thereader110 performing specific functions, such functions may be performed by theapplication118 and/or thePOS terminal110 and communicated to thedevice120 via thereader115.
At block460, thecontactless device120 receives the purchase total from thedevice reader115 and determines whether the user has different payment options, including but not limited to gift cards, credit cards, debit cards, prepaid cards, and split-tender transactions (for example the user can pay x amount of dollars on a gift card and the remainder on another form of payment). In an exemplary embodiment, thecontactless device120 reviews a list of payment options available via thesecure element126.
If thecontactless device120 determines in block460 that multiple payment options are available, thecontactless device120 communicates the payment options to the user in block465 via the user interface123. In an exemplary embodiment, thecontactless device120 creates a priority list of payment options and communicates the options to the user. In another exemplary embodiment, the user pre-selects the order of the payment options using theapplication122 when registering and/or configuring theapplication122. In an exemplary embodiment, the payment options are present in the form of a pop-up prompt on thecontactless device120. In another exemplary embodiment, theapplication122 is automatically opened and the options are displayed on thecontactless device120. Payment options may be presented in the predetermined order, or all payment options may be presented simultaneously for selection by the user.
In block470, the user selects one or more payment service options. In an exemplary embodiment, the user interacts with the touch-screen of thecontactless device120 to select a payment option. In another exemplary embodiment, the user may select the button that corresponds to the selected payment option. The user may select multiple payment options, such as a gift card for the merchant or other stored value card, a debit card, a debit card, or other suitable electronic payment method.
Thecontactless device120 requests a PIN authorization from the user in block480. In an exemplary embodiment, the PIN authorization is created when the user registers/configures theapplication122 and/or theapplications127 on thesecure element126 corresponding to each payment method. Block480 is required only if a particular payment method requires PIN authorization.
Referring back to block460, if thecontactless device120 determines that only a single payment option exists, options are not communicated to the user and thecontactless device120 requests a PIN authorization from the user in block480 for the only available payment method identified.
In block490, the user enters the PIN authorization. In an exemplary embodiment, the user uses a keypad, touchscreen, or other input mechanism of thecontactless device120 to enter the PIN authorization.
In the exemplary embodiment depicted inFIG. 4, the user selects all desired payment options that are then communicated together to the reader115 (seeblock260 inFIG. 2). Alternatively, the user may select a payment method, which is communicated to thereader115 and processed via block260 (FIG. 2). Then, the method240 (or portions of the method240) may be repeated for the user to select another payment method for the remaining balance of the purchase transaction. In this manner, the user may apply individually multiple payment methods.
From block490, themethod250 proceeds to block250 (FIG. 2).
Thesecure element126 then confirms a valid PIN authorization inblock250. In an exemplary embodiment, thesecure element126 will notify the user of an incorrect PIN authorization entry. The user may then be prompted to enter a new PIN authorization. In an exemplary embodiment, thecontactless device120 has established a safety protocol for determining the number of incorrect PIN authorizations allowed before the communication is terminated. In an exemplary embodiment, the PIN authorization is established during the registration/configuration of theapplication122 and is encrypted/saved in thesecure element126.
Inblock260, the payment transaction is completed. In an exemplary embodiment, thecontactless device120 communicates the payment information to thedevice reader115 via thesecure communication channel130. In an exemplary embodiment, the POS terminal110 processes the transaction and confirms payment. If multiple payment methods are selected, the POS terminal110 processes each payment in the specified order or a predetermined order to complete the payment transaction.
Thedevice reader115 communicates a digital receipt to thecontactless device120 inblock270. In an exemplary embodiment, the digital receipt can include a list of products purchased, a description of each product purchased, the price for each product purchased, a product category for each product purchased, a total price, a stock keeping unit (“SKU”) or similar identifier for each product purchased, discounts applied, the time and/or date of purchase, warranty information for the products purchased, or other suitable information. The digital receipt can also include information regarding the merchant, including the name of the merchant, the merchant's address, the merchant's telephone number, and any other suitable information regarding the merchant. In an exemplary embodiment, the receipt includes a list of options selected by the user. As used throughout this specification, the term “product” should be interpreted to include tangible and intangible products, as well as services.
Inblock280, the contactless device receives the digital receipt, and thesecure communication channel130 is terminated.
In an exemplary embodiment, the original NFC connection can be terminated when the request to establish a secure communication channel between thereader115 and thedevice120 is communicated, or any suitable time thereafter.
General
The exemplary methods and blocks described in the embodiments presented previously are illustrative, and, in alternative embodiments, certain blocks can be performed in a different order, in parallel with one another, omitted entirely, and/or combined between different exemplary methods, and/or certain additional blocks can be performed, without departing from the scope and spirit of the invention. Accordingly, such alternative embodiments are included in the invention described herein.
The invention can be used with computer hardware and software that performs the methods and processing functions described above. As will be appreciated by those having ordinary skill in the art, the systems, methods, and procedures described herein can be embodied in a programmable computer, computer executable software, or digital circuitry. The software can be stored on computer readable media. For example, computer readable media can include a floppy disk, RAM, ROM, hard disk, removable media, flash memory, memory stick, optical media, magneto-optical media, CD-ROM, etc. Digital circuitry can include integrated circuits, gate arrays, building block logic, field programmable gate arrays (“FPGA”), etc.
Although specific embodiments of the invention have been described above in detail, the description is merely for purposes of illustration. Various modifications of, and equivalent blocks corresponding to, the disclosed aspects of the exemplary embodiments, in addition to those described above, can be made by those having ordinary skill in the art without departing from the spirit and scope of the invention defined in the following claims, the scope of which is to be accorded the broadest interpretation so as to encompass such modifications and equivalent structures.